General

  • Target

    2024-05-22_11d746f46d023b2c3e9f24a84fe96bfe_cryptolocker

  • Size

    53KB

  • MD5

    11d746f46d023b2c3e9f24a84fe96bfe

  • SHA1

    3f6a72514d21ade9ee04ad3b468b4d275bf3869a

  • SHA256

    a5987eadee588fac2c5d3dc8326113875320dca5e5ad9ae67308de0497ca97d0

  • SHA512

    cc6de8f87d7a29d8100d41a75fc0ced482a23b5066f5e16154d8930ed3bc08834eaa3bc035e7ca4a9e0d68cd38ec0d62facf07d3631836dffa856c40dd7a07dc

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOXC:bODOw9acifAoc+vl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-22_11d746f46d023b2c3e9f24a84fe96bfe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections